Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter October 9, 2013

A secret sharing scheme based on the Closest Vector Theorem and a modification to a private key cryptosystem

  • Benjamin Fine EMAIL logo , Anja I. S. Moldenhauer and Gerhard Rosenberger

Abstract.

We explain and perform the steps for an (n,t) secret sharing scheme based on the closest vector theorem. We then compare this scheme and its complexity to the secret sharing schemes of both Shamir and Panagopoulos. Finally we modify the (n,t) secret sharing scheme to a private key cryptosystem.

Received: 2013-01-05
Revised: 2013-08-02
Published Online: 2013-10-09
Published in Print: 2013-11-01

© 2013 by Walter de Gruyter Berlin Boston

Downloaded on 27.2.2025 from https://www.degruyter.com/document/doi/10.1515/gcc-2013-0012/html
Scroll to top button
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy